Category: GBHackers
Predator, a bot protection tool designed to fight against bots and crawlers, has now been found to be abused by…
Web injections involve injecting malicious code into websites to manipulate content or redirect users to fraudulent sites. Threat actors use…
Researchers have discovered two novel techniques on GitHub: one exploits GitHub Gists, while the other involves sending commands through Git commit…
In a groundbreaking initiative spanning 34 countries, INTERPOL orchestrates Operation HAECHI IV, a relentless assault on online financial crime, yielding…
Sidewinder APT group’s sophisticated threat landscape reveals a skilled and persistent threat targeting the Nepalese Government entities. Their focus extends…
Recently, the Cybersecurity and Infrastructure Security Agency (CISA) has requested technology device manufacturers to take measures to eliminate default passwords…
SMTP (Simple Mail Transfer Protocol) smuggling is a technique where attackers exploit the inconsistencies in how proxy servers or firewalls…
Attackers have been exploiting the Apache ActiveMQ Vulnerability (CVE-2023-46604) to steal data and install malware constantly. Using the Apache ActiveMQ remote…
QakBot (aka Qbot) primarily targets financial institutions since it is a sophisticated banking trojan and malware. This malware can facilitate…
The 8220 hacker group, which was first identified in 2017 by Cisco Talos, is exploiting both Windows and Linux web…
3CX, a VoIP communications firm, has advised customers to disable SQL Database integrations due to the risks posed by a potential…
Goodbye, third-party cookies. Hello, Tracking Protection! Chrome, the world’s most popular browser, is taking a major step toward a privacy-first web…